Home
last modified time | relevance | path

Searched refs:decode (Results 1 – 25 of 49) sorted by relevance

12

/hostap-latest/tests/hwsim/
Dtshark.py52 out = output[0].decode(errors='ignore')
53 out1 = output[1].decode()
76 out = cmd.communicate()[0].decode()
122 out = output[0].decode()
Dtest_hs20_filter.py35 … o = subprocess.check_output(self._cmd + ['show', 'tentative', 'dev', self._iface]).decode()
170 pkt = binascii.hexlify(pkt).decode()
175 if hapd.own_addr() in subprocess.check_output(['ip', 'neigh', 'show']).decode():
197 pkt = binascii.hexlify(pkt).decode()
202 if hapd.own_addr() in subprocess.check_output(['ip', 'neigh', 'show']).decode():
Dremotehost.py27 buf = subprocess.check_output(command, stderr=err, bufsize=0).decode()
80 return status, buf.decode()
101 return status, buf.decode()
201 line = line.decode()
223 res = proc.stdout.read(4094).decode()
Dtest_p2p_messages.py804 …=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode()))
830 …=1 action={}".format(addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode()))
912 addr0, addr0, peer['listen_freq'], binascii.hexlify(msg['payload']).decode()))
933 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
950 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
970 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
990 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
1007 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
1039 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
1063 addr0, addr0, rx_msg['freq'], binascii.hexlify(msg['payload']).decode()))
[all …]
Dtest_dpp.py86 "DPP:K:" + base64.b64encode(b"hello").decode() + ";;",
393 …d=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase.encode()).d…
924 … init_extra="conf=sta-psk pass=%s" % binascii.hexlify(b"passphrase").decode(),
940 ssid1h = binascii.hexlify(ssid1.encode()).decode()
941 pass1h = binascii.hexlify(pass1.encode()).decode()
942 ssid2h = binascii.hexlify(ssid2.encode()).decode()
943 pass2h = binascii.hexlify(pass2.encode()).decode()
994 ssid1h = binascii.hexlify(ssid1.encode()).decode()
995 ssid2h = binascii.hexlify(ssid2.encode()).decode()
996 pass2h = binascii.hexlify(pass2.encode()).decode()
[all …]
Dtest_wnm.py423 msg['da'], msg['bssid'], binascii.hexlify(msg['payload']).decode()))
438 msg['da'], msg['bssid'], binascii.hexlify(msg['payload']).decode()))
2041 dev[0].set("coloc_intf_elems", binascii.hexlify(no_intf).decode())
2045 if addr + " 1 " + binascii.hexlify(no_intf).decode() not in ev:
2057 res = dev[0].request("COLOC_INTF_REPORT " + binascii.hexlify(no_intf).decode())
2063 if addr + " 0 " + binascii.hexlify(no_intf).decode() not in ev:
2141 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
2147 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
2153 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
2159 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
[all …]
Dtest_macsec.py190 res = cmd.stdout.read().decode()
197 res = cmd.stdout.read().decode()
512 res = cmd.stdout.read().decode()
520 res = cmd.stdout.read().decode()
528 res = cmd.stdout.read().decode()
535 res = cmd.stdout.read().decode()
543 res = cmd.stdout.read().decode()
551 res = cmd.stdout.read().decode()
684 res = c.stdout.read().decode()
Dtest_eap_proto.py187 logger.info("eap_handler - RX " + binascii.hexlify(req).decode())
409 logger.info("eap_handler - RX " + binascii.hexlify(req).decode())
511 logger.info("sake_handler - RX " + binascii.hexlify(req).decode())
874 logger.info("sake_handler - RX " + binascii.hexlify(req).decode())
1011 sess = binascii.hexlify(struct.pack('B', (sess + 1) % 256)).decode()
1071 logger.info("leap_handler - RX " + binascii.hexlify(req).decode())
1240 logger.info("leap_handler2 - RX " + binascii.hexlify(req).decode())
1542 logger.info("md5_handler - RX " + binascii.hexlify(req).decode())
1712 logger.info("otp_handler - RX " + binascii.hexlify(req).decode())
1776 logger.info("otp_handler2 - RX " + binascii.hexlify(req).decode())
[all …]
Dtest_fils.py631 expected += binascii.hexlify(hash[0:2]).decode()
644 expected += binascii.hexlify(hash[0:2]).decode()
806 "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()]
901 …n dev[0].request("FILS_HLP_REQ_ADD " + "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()):
948 …n dev[0].request("FILS_HLP_REQ_ADD " + "ff:ff:ff:ff:ff:ff " + binascii.hexlify(dhcpdisc).decode()):
1121 "0800" + binascii.hexlify(ipv4_overflow).decode(),
1122 "0800" + binascii.hexlify(ipv4_unknown_proto).decode(),
1123 "0800" + binascii.hexlify(ipv4_missing_udp_hdr).decode(),
1124 "0800" + binascii.hexlify(udp_overflow).decode(),
1125 "0800" + binascii.hexlify(udp_underflow).decode(),
[all …]
Dtest_dpp3.py68 ssid = binascii.hexlify("sae".encode()).decode()
69 password = binascii.hexlify("sae-password".encode()).decode()
413 ssid_hex = binascii.hexlify(ssid.encode()).decode()
530 ssid_hex = binascii.hexlify(ssid.encode()).decode()
557 ssid_hex = binascii.hexlify(ssid.encode()).decode()
Dwlantest.py115 return subprocess.check_output([self.wlantest_cli] + params).decode()
285 res[0].decode().strip()))
288 res[1].decode().strip()))
Dtest_ap_hs20.py137 "GSM-AUTH-REQ 232010000000000 " + rand]).decode()
359 if binascii.hexlify(b"example.com").decode() not in nai1:
361 if binascii.hexlify(b"example.org").decode() in nai1:
363 if binascii.hexlify(b"example.com").decode() not in nai2:
365 if binascii.hexlify(b"example.org").decode() not in nai2:
3217 hex = binascii.hexlify(icon).decode()
3564 if bss["hs20_operator_icon_metadata"] != binascii.hexlify(value).decode():
4345 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
4351 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
4357 if "OK" not in dev[1].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
[all …]
Dtest_ap_ft.py1010 snonce = binascii.hexlify(req['payload'][111:111+32]).decode()
1015 snonce = binascii.hexlify(req['payload'][111:111+32]).decode()
1020 r0khid = binascii.hexlify(req['payload'][145:145+10]).decode()
1025 r0khid = binascii.hexlify(req['payload'][145:145+10]).decode()
2874 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
2879 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
2884 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
2889 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
2894 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
2899 if "OK" not in dev[0].request("DATA_TEST_FRAME " + binascii.hexlify(pkt).decode()):
[all …]
Dtest_gas.py1035 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode())
1067 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode())
1227 public_id = binascii.hexlify(held + supl).decode()
1652 venue_name = binascii.hexlify(venue_info + venue1 + venue2).decode()
1658 venue_url = binascii.hexlify(duple1 + duple2).decode()
1696 if not bss['anqp_capability_list'].startswith(binascii.hexlify(ids).decode()):
1715 venue_name = binascii.hexlify(venue_info + venue1 + venue2).decode()
1721 venue_url = binascii.hexlify(duple1 + duple2).decode()
1756 if not bss['anqp_capability_list'].startswith(binascii.hexlify(ids).decode()):
1915 …GMT_TX {} {} freq=2412 wait_time=10 action={}".format(bssid, bssid, binascii.hexlify(msg).decode())
[all …]
Dutils.py153 reg = cmd.stdout.read().decode()
162 reg = cmd.stdout.read().decode()
170 reg_rules = cmd.stdout.read().decode().splitlines()
Dtest_ap_eap.py136 def read_pem(fname, decode=True): argument
143 if not decode:
150 if not decode:
152 if decode:
343 encrypted_id = base64.b64encode(data).decode()
709 "GSM-AUTH-REQ 232010000000000 " + rand]).decode()
735 "GSM-AUTH-REQ 232010000000009 " + rand]).decode()
775 "GSM-AUTH-REQ 232010000000000 " + rand]).decode()
802 "GSM-AUTH-REQ 232010000000009 " + rand]).decode()
845 "GSM-AUTH-REQ 232010000000000 " + rand]).decode()
[all …]
Dtest_nfc_wps.py165 binascii.hexlify(new_ssid.encode()).decode() +
167 binascii.hexlify(new_passphrase.encode()).decode())
210 binascii.hexlify(new_ssid.encode()).decode() +
212 binascii.hexlify(new_passphrase.encode()).decode())
Dtest_hs20_pps_mo.py23 "set_pps", pps_mo]).decode()
Dtest_wmediumd.py73 verstr = subprocess.check_output(['wmediumd', '-V']).decode()
112 line = p.stdout.readline().decode()
125 output_wmediumd_log(p, params, stdoutdata.decode())
Dhostapd.py60 return ret, out.decode()
177 return ret, out.decode()
407 res = self.request("MGMT_TX " + binascii.hexlify(hdr + msg['payload']).decode())
500 cmd += " ssid=" + binascii.hexlify(ssid.encode()).decode()
545 cmd += " ssid=" + binascii.hexlify(ssid.encode()).decode()
547 cmd += " pass=" + binascii.hexlify(passphrase.encode()).decode()
/hostap-latest/wpa_supplicant/examples/
Dwps-nfc.py84 return ret.rstrip().decode("hex")
94 return ret.rstrip().decode("hex")
104 return ret.rstrip().decode("hex")
113 return ret.rstrip().decode("hex")
126 return res.decode("hex")
Dp2p-nfc.py97 return res.decode("hex")
106 return res.decode("hex")
119 return res.decode("hex")
129 return res.rstrip().decode("hex")
/hostap-latest/hostapd/
Dwps-ap-nfc.py78 return ret.rstrip().decode("hex")
88 return ret.rstrip().decode("hex")
98 return ret.rstrip().decode("hex")
/hostap-latest/wpaspy/
Dwpaspy.py96 res = self.s.recv(4096).decode()
144 res = self.s.recv(4096).decode()
/hostap-latest/tests/hwsim/vm/
Dparallel-vm.py106 out = out.decode()
195 err = err.decode()
490 name = l.decode().split(' ')[0]
701 ver = cmd.stdout.read().decode().strip()

12